<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ConfusedPilot Attack Can Manipulate RAG-Based AI Systems in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/ConfusedPilot-Attack-Can-Manipulate-RAG-Based-AI-Systems/m-p/74567#M7259</link>
    <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Attackers can add a malicious document to the data pools used by artificial intelligence (AI) systems to create responses, which can confuse the system and potentially lead to misinformation and compromised decision-making processes within organisations.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Researchers from the Spark Research Lab at the University of Texas (UT) at Austin discovered the attack vector, which they've dubbed &lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;A class="" href="https://confusedpilot.info/" target="_blank" rel="noopener"&gt;ConfusedPilot&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; because it affects all retrieval augmented generation &lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;A class="" href="https://www.darkreading.com/application-security/zero-click-genai-worm-malware-poisoning-models" target="_self"&gt;(RAG)-based AI systems&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;, including &lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;A class="" href="https://www.darkreading.com/application-security/how-to-weaponize-microsoft-copilot-for-cyberattackers" target="_self"&gt;Microsoft 365 Copilot.&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; This includes other RAG-based systems that use Llama, Vicuna, and OpenAI, according to the researchers.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;A href="https://www.darkreading.com/cyberattacks-data-breaches/confusedpilot-attack-manipulate-rag-based-ai-systems" target="_blank" rel="noopener"&gt;https://www.darkreading.com/cyberattacks-data-breaches/confusedpilot-attack-manipulate-rag-based-ai-systems&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Caute_ Cautim&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 16 Oct 2024 03:15:04 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2024-10-16T03:15:04Z</dc:date>
    <item>
      <title>ConfusedPilot Attack Can Manipulate RAG-Based AI Systems</title>
      <link>https://community.isc2.org/t5/Industry-News/ConfusedPilot-Attack-Can-Manipulate-RAG-Based-AI-Systems/m-p/74567#M7259</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Attackers can add a malicious document to the data pools used by artificial intelligence (AI) systems to create responses, which can confuse the system and potentially lead to misinformation and compromised decision-making processes within organisations.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Researchers from the Spark Research Lab at the University of Texas (UT) at Austin discovered the attack vector, which they've dubbed &lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;A class="" href="https://confusedpilot.info/" target="_blank" rel="noopener"&gt;ConfusedPilot&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; because it affects all retrieval augmented generation &lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;A class="" href="https://www.darkreading.com/application-security/zero-click-genai-worm-malware-poisoning-models" target="_self"&gt;(RAG)-based AI systems&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;, including &lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;A class="" href="https://www.darkreading.com/application-security/how-to-weaponize-microsoft-copilot-for-cyberattackers" target="_self"&gt;Microsoft 365 Copilot.&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; This includes other RAG-based systems that use Llama, Vicuna, and OpenAI, according to the researchers.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;A href="https://www.darkreading.com/cyberattacks-data-breaches/confusedpilot-attack-manipulate-rag-based-ai-systems" target="_blank" rel="noopener"&gt;https://www.darkreading.com/cyberattacks-data-breaches/confusedpilot-attack-manipulate-rag-based-ai-systems&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Caute_ Cautim&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Oct 2024 03:15:04 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/ConfusedPilot-Attack-Can-Manipulate-RAG-Based-AI-Systems/m-p/74567#M7259</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-10-16T03:15:04Z</dc:date>
    </item>
  </channel>
</rss>

